AlphaRNG is our next-generation hardware random number generator. Compared to other generators of its class, AlphaRNG implements data communications over a secure channel for confidentiality, integrity, and replay protection using a USB interface.
We have also enhanced the design to ensure the reliability of the built-in health tests using a technique known as hardware fault insertion (also known as fault injection). Hardware fault insertion is used to create temporary signal faults in the noise sources for the purpose of validating the expected behavior of the device under failure conditions.
AlphaRNG can be integrated in software projects through provided software API implementation kit and software utilities. Compact and lightweight, AlphaRNG fits neatly inside a computer enclosure using internal USB port. It can also be connected directly to any external USB port and used over a secure communication channel.
Are you a student or educator? Learn about our education discount. If the add cart button isn’t working, visit our shop directly here.
Devices ship in 1–2 business days. For bulk orders (10+ units), please contact us directly. International buyers are responsible for import duties, taxes, and customs clearance upon delivery.
How it works
The entropy byte-stream provided in the AlphaRNG output is based on electrical noise produced by two Zener diodes operating in avalanche mode. The independent electrical noise created by each electrical circuit is amplified and sampled into separate raw byte-streams and have uniform distribution of the random values. The two resulting raw byte-streams are then combined and de-biased to produce the resulting entropy byte stream. The AlphaRNG software kit provides an API for retrieving data at each processing stage for the purpose of evaluation or, for example, when a different post-processing or conditioning algorithm is to be used.
Quality checking
AlphaRNG implements an embedded health check test (HCT) that monitors the quality of each random noise source immediately after the electrical noise is digitized and before any further processing is done. The HCT test runs at device start-up and can also be triggered at any time through the software API.
AlphaRNG also implements the ‘Repetition Count Test’ and the ‘Adaptive Proportion Test’ as part of the device start-up tests that can also be triggered at any time through the software API.
The health check status byte is appended to each transmitted data packet so that the host computer is continuously notified about the health of the generator.
In thev AlphaRNG device, the HCT is validated using a technique known as hardware fault insertion. Hardware fault insertion is used to create temporary signal faults in the noise sources for the purpose of validating the test logic of the device under failure conditions.
‘Repetition Count Test’ and ‘Adaptive Proportion Test’ tests are also implemented and continuously performed through provided AlphaRNG Software API on the host computer to ensure the quality of the random bytes retrieved through the USB interface.
Tech specs
Available asymmetric ciphers | RSA-2048, RSA-1024 |
Available symmetric ciphers | AES-256-GCM, AES-128-GCM |
Available MAC algorithms | HMAC-SHA256, HMAC-SHA160, HMAC-MD5 |
Implemented statistical tests | Start-up and on-demand ‘Repetition Count’ and ‘Adaptive Proportion’ |
Continuous statistical tests | ‘Repetition Count’ and ‘Adaptive Proportion’ implemented in the software kit |
Health check test (HCT) | Start-up and on-demand Health diagnostics of both random noise sources |
HCT validation | Hardware fault insertion |
Alternative Entropy Extractors | SHA-256 and SHA-512 entropy extractors implemented in the software kit |
Data download speed | It varies depending on the cipher type and HMAC algorithm selected |
Max data download speed | Up to 199 Mbps when used in non-secure mode |
Data download speed in MAC mode | 30 Mbps when using HMAC-MD5, 19 Mbps when using HMAC-SHA160, 10 Mbps when using HMAC-SHA256 |
Data download speed in AES mode | 5.2 Mbps when using AES-128-GCM, 4.6 Mbps when using AES-256-GCM |
Data connectivity and control interface | USB 2 high-speed interface with integrated EMI filtering and ESD protection |
Random noise source | Two independent circuits based on avalanche breakdown effect in reversed-biased Zener diodes |
Device security | Secure booting from an encrypted firmware image, device access and debugging disabled |
Software Kit dependencies | OpenSSL 1.1+ |
Power supply | USB bus powered |
Power consumption | 220 mA in active mode, 90 mA when inactive |
RoHS compliance | All parts and materials are lead-free and RoHS compliant |
Country of origin | United States |
Use cases
AlphaRNG can be used for a wide range of purposes:
- Live entropy source for seeding a Deterministic Random Bit Generator (DRBG)
- Accessing randomness over a secure data connection
- Generation of cryptographic keys and nonces
- Research (statistical sampling)
- Computer simulations
- Gaming servers
Statistical tests
The AlphaRNG device passes the following statistical test suites for measuring the quality of randomness: Dieharder, NIST, Rngtest, Ent, IID.
You can download sample test reports using links below:
- Big Crush using
TestU01
software library dieharder
test reportNIST
test reportrngtest
test report for 12 GB of generated random bytesea_iid
test report for 1000000 RAW bytes from noise source 1ea_iid
test report for 1000000 RAW bytes from noise source 2
Visual tests
A quick way to determine the quality of an RNG is to create visual tests. Visual patterns can easily be recognized by humans.
Random steering wheel test
can be used as a technique for visualizing randomness.
- An mp4 video recording of a
Random steering wheel test
sample output produced by an AlphaRNG device.
Device output samples
- 1000000 random bytes retrieved from device (file MD5: 8a2390697f71ed3d48e4689b5bf70436)
- 1000000 RAW random bytes retrieved from the first noise source (file MD5: ed28b56d087e33220ed36d9e39ac961d)
- 1000000 RAW random bytes retrieved from the second noise source (file MD5: 183bcf2b744582d8bda3aee4293b06ad)
System requirements
- Linux (x86, x64)
- or FreeBSD 12/13
- or macOS (Intel and M1 chips)
- or 64 bit Windows 10/11, 64 bit Windows Server 2016/2019
- USB 2.0 or 3.0 high-speed host/hub
Virtual machine compatibility
The AlphaRNG device has been tested with the following virtual machine software:
- VMware ESXi 6.7.0
- VMware Workstation 15 Player
- Oracle VirtualBox 6.1
- Parallels Desktop for Mac (Intel & ARM)
Warranty and return policy
TectroLabs offers a 1-year limited warranty and an optional 3-year extended warranty on the AlphaRNG. We will repair or replace any device that fails due to any defects in materials or manufacturing. The AlphaRNG device may be returned within 30 days of purchase for a full refund minus credit card processing charge (the buyer will pay for return shipping).